[AKIRA] – Ransomware Victim: Designs for Vision
![[AKIRA] - Ransomware Victim: Designs for Vision 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On November 3, 2025, a leak post attributed to the threat actor group akira targets Designs for Vision, a US-based healthcare company that specializes in magnification products and LED headlights for dental, medical, and low-vision applications. The post identifies Designs for Vision as a victim and frames the incident as a data‑leak event rather than a full device encryption. The attackers claim they will upload about 50 GB of corporate documents in the near term, signaling ongoing data exfiltration and potential public disclosure. The leak page notes that the stolen material may include project information, some personal information, credit card details and other financial and accounting data, contracts and agreements, NDAs, and related documents. Because no explicit compromise date is provided on the page, the published date on the leak entry is treated as the post date for the incident.
The leak page contains no images or screenshots; there are no visible thumbnails or attachments listed, and no downloadable data is shown on the entry. The post does not include any stated ransom amount. Taken together, these claims align with ransomware operators’ data‑leak extortion tactics, where stolen material is threatened with public disclosure rather than only encrypting systems. This incident underscores ongoing risk to healthcare organizations that handle sensitive project information, personal data, and financial documents in the face of adversaries advertising forthcoming data disclosures.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
